CVE-2025-6947
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the SIP Proxy module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.
This issue affects Firebox: from 12.0 through 12.11.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in WatchGuard Fireware OS SIP Proxy allows authenticated admins to execute arbitrary JS in management interface.
Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in the management interface of WatchGuard Firebox appliances via the SIP Proxy configuration. The root cause is improper neutralization of user-supplied input during web page generation, allowing injection of arbitrary JavaScript code [1].
Exploitation
To exploit this vulnerability, an attacker must have authenticated administrator access to a locally managed Firebox. The attacker can then inject malicious script into the SIP Proxy settings. When another administrator views the affected management interface, the injected script executes in their browser session [1].
Impact
Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of another management user's browser. This could lead to actions performed on behalf of that user, such as modifying firewall rules, exfiltrating configuration data, or further pivoting within the network [1].
Mitigation
WatchGuard has released patched versions: Fireware OS 12.11.3 for general 12.x models, and 12.5.13 for T15 and T35 models. No workaround is available [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: >=12.0 <=12.11.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.